{"id":1896,"date":"2016-05-19T10:59:40","date_gmt":"2016-05-19T15:59:40","guid":{"rendered":"http:\/\/www.stratospherenetworks.com\/blog\/?p=1896"},"modified":"2018-06-26T12:04:15","modified_gmt":"2018-06-26T17:04:15","slug":"are-you-reactive-or-proactive-when-it-comes-to-it-security","status":"publish","type":"post","link":"https:\/\/www.stratospherenetworks.com\/blog\/are-you-reactive-or-proactive-when-it-comes-to-it-security\/","title":{"rendered":"Are You Reactive or Proactive When it Comes to IT Security?"},"content":{"rendered":"<p><a href=\"http:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2016\/05\/shield-security.jpg\"><img decoding=\"async\" class=\"alignleft size-medium wp-image-1897\" src=\"http:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2016\/05\/shield-security-300x230.jpg\" alt=\"IT security\" width=\"300\" height=\"230\" srcset=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2016\/05\/shield-security-300x230.jpg 300w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2016\/05\/shield-security-1024x785.jpg 1024w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>IT security threats are evolving to become increasingly intelligent and dynamic, and data breaches are becoming more prevalent. In 2015, the number of tracked breaches in the U.S. reached 781, according to the <a href=\"http:\/\/www.idtheftcenter.org\/ITRC-Surveys-Studies\/2015databreaches.html\" target=\"_blank\" class=\"external external_icon\" rel=\"nofollow\">Identity Theft Resource Center<\/a>. That\u2019s the second highest amount of breaches recorded in a year since the ITRC began keeping track in 2005. The rise of smarter cyber criminals and rapidly changing threats means that taking a proactive rather than reactive approach is more vital than ever for businesses looking to stay secure.<\/p>\n<p><strong>Current IT Security Threats: The Rise of Ransomware<\/strong><br \/>\nThere are a number of different types of IT security threats out there, from phishing to spyware to RAM scraping. However, one of the biggest types of cyber security threats facing businesses in 2016 is ransomware, a form of malware that cyber criminals increasingly use to hold data hostage. After encrypting a victim\u2019s files with ransomware, the attackers will demand compensation for the decryption key. CryptoLocker is probably the most infamous type of ransomware out there, and businesses still get hit by it.<\/p>\n<p>Becoming the target of ransomware and having to pay the cyber criminals to get clients\u2019 data back can be costly for any organization. For instance, the CryptoWall version 3 threat caused more than $325 million in damages worldwide, according to the <a href=\"http:\/\/cyberthreatalliance.org\/index.html\" target=\"_blank\" class=\"external external_icon\" rel=\"nofollow\">Cyber Threat Alliance<\/a>. Although keeping your anti-malware updated and <a href=\"http:\/\/www.stratospherenetworks.com\/basic-backup.html\" target=\"_blank\">backing up<\/a> your data can help, hackers have become smarter and IT security threats are becoming more dynamic, which makes them harder to fend off with a standard anti-virus and firewall solution.<br \/>\n<strong><br \/>\nThe Impact of Security Threats: Questions to Consider<br \/>\n<\/strong>Being reactive rather than proactive when it comes to IT security could lead to various negative consequences for your business. Here are just a few questions you should consider about the potential effects of using a reactive approach:<\/p>\n<p>-If your business cannot access data, how much does that cost you per hour in the form of lost productivity? The average total cost per minute of an unplanned data center outage is $8,851, according to the 2016 <a href=\"http:\/\/www.emersonnetworkpower.com\/en-US\/About\/NewsRoom\/NewsReleases\/Pages\/Emerson-Network-Power-Study-Says-Unplanned-Data-Center-Outages-Cost-Companies-Nearly-9000-Per-Minute-.aspx\" target=\"_blank\" class=\"external external_icon\" rel=\"nofollow\">Cost of Data Center Outages report<\/a> from Emerson Power Network and the Ponemon Institute.<\/p>\n<p>-How will not being able to access your data affect your clients and prospects?<\/p>\n<p>-How much will it cost you to pay an outsourced IT firm to come in and clean up the environment?<\/p>\n<p>-Will any of the data be compromised and will trade secrets be taken?<\/p>\n<p>-Is any of the information considered personally identifiable information (PII), protected health information (PHI), or financial in nature (i.e., PCI, GLBA, etc.)? If so, a data breach could have regulatory consequences for your organization.<\/p>\n<p>-How many hours, days or months will it take your business bounce back from this? 61 percent of small to midsize businesses say the recovery time objective for mission-critical applications must be four hours or less, according to the <a href=\"https:\/\/www.carbonite.com\/globalassets\/files-white-papers\/carb-idc-smb-cloud-growth-opportunity-report.pdf\" target=\"_blank\" class=\"external external_icon\" rel=\"nofollow\">International Data Corporation<\/a>.<\/p>\n<p>At Stratosphere Networks, we have been working with clients to provide proactive IT security measures in order to help them take charge in the fight against more intelligent hackers and dynamic threats.\u00a0How important is IT security to you, and will you be proactive or reactive to your next IT security threat?<\/p>\n<p>To learn more about proactive IT security, contact us today by calling 877-599-3999 or emailing <a href=\"mailto:sales@stratospherenetworks.com\" target=\"_blank\">sales@stratospherenetworks.com<\/a>.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>IT security threats are evolving to become increasingly intelligent and dynamic, and data breaches are becoming more prevalent. In 2015, the number of tracked breaches in the U.S. reached 781, according to the Identity Theft Resource Center. That\u2019s the second &hellip; <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/are-you-reactive-or-proactive-when-it-comes-to-it-security\/\">Read more <span class=\"meta-nav\">><\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":3391,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[261],"tags":[],"class_list":["post-1896","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-tips-from-the-president"],"yoast_head":"<title>Are You Reactive or Proactive When it Comes to IT Security?<\/title>\n<meta name=\"description\" content=\"With the rise of smarter cyber criminals and rapidly evolving threats, using a proactive approach to IT security is more important than ever.\u00a0\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/are-you-reactive-or-proactive-when-it-comes-to-it-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Are You Reactive or Proactive When it Comes to IT Security?\" \/>\n<meta property=\"og:description\" content=\"With the rise of smarter cyber criminals and rapidly evolving threats, using a proactive approach to IT security is more important than ever.\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/are-you-reactive-or-proactive-when-it-comes-to-it-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\" \/>\n<meta property=\"article:published_time\" content=\"2016-05-19T15:59:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-06-26T17:04:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"dsparks\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"dsparks\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/are-you-reactive-or-proactive-when-it-comes-to-it-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/are-you-reactive-or-proactive-when-it-comes-to-it-security\/\"},\"author\":{\"name\":\"dsparks\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\"},\"headline\":\"Are You Reactive or Proactive When it Comes to IT Security?\",\"datePublished\":\"2016-05-19T15:59:40+00:00\",\"dateModified\":\"2018-06-26T17:04:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/are-you-reactive-or-proactive-when-it-comes-to-it-security\/\"},\"wordCount\":558,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/are-you-reactive-or-proactive-when-it-comes-to-it-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"articleSection\":[\"Tech Tips from the President\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/are-you-reactive-or-proactive-when-it-comes-to-it-security\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/are-you-reactive-or-proactive-when-it-comes-to-it-security\/\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/are-you-reactive-or-proactive-when-it-comes-to-it-security\/\",\"name\":\"Are You Reactive or Proactive When it Comes to IT Security?\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/are-you-reactive-or-proactive-when-it-comes-to-it-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/are-you-reactive-or-proactive-when-it-comes-to-it-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"datePublished\":\"2016-05-19T15:59:40+00:00\",\"dateModified\":\"2018-06-26T17:04:15+00:00\",\"author\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\"},\"description\":\"With the rise of smarter cyber criminals and rapidly evolving threats, using a proactive approach to IT security is more important than ever.\u00a0\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/are-you-reactive-or-proactive-when-it-comes-to-it-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/are-you-reactive-or-proactive-when-it-comes-to-it-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/are-you-reactive-or-proactive-when-it-comes-to-it-security\/#primaryimage\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"contentUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"width\":1024,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/are-you-reactive-or-proactive-when-it-comes-to-it-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stratospherenetworks.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Are You Reactive or Proactive When it Comes to IT Security?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/\",\"name\":\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\",\"description\":\"The Stratosphere Networks IT Support blog offering IT Support Services information.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\",\"name\":\"dsparks\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g\",\"caption\":\"dsparks\"},\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/author\/dsparks\/\"}]}<\/script>","yoast_head_json":{"title":"Are You Reactive or Proactive When it Comes to IT Security?","description":"With the rise of smarter cyber criminals and rapidly evolving threats, using a proactive approach to IT security is more important than ever.\u00a0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stratospherenetworks.com\/blog\/are-you-reactive-or-proactive-when-it-comes-to-it-security\/","og_locale":"en_US","og_type":"article","og_title":"Are You Reactive or Proactive When it Comes to IT Security?","og_description":"With the rise of smarter cyber criminals and rapidly evolving threats, using a proactive approach to IT security is more important than ever.\u00a0","og_url":"https:\/\/www.stratospherenetworks.com\/blog\/are-you-reactive-or-proactive-when-it-comes-to-it-security\/","og_site_name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","article_published_time":"2016-05-19T15:59:40+00:00","article_modified_time":"2018-06-26T17:04:15+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","type":"image\/png"}],"author":"dsparks","twitter_card":"summary_large_image","twitter_misc":{"Written by":"dsparks","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stratospherenetworks.com\/blog\/are-you-reactive-or-proactive-when-it-comes-to-it-security\/#article","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/are-you-reactive-or-proactive-when-it-comes-to-it-security\/"},"author":{"name":"dsparks","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c"},"headline":"Are You Reactive or Proactive When it Comes to IT Security?","datePublished":"2016-05-19T15:59:40+00:00","dateModified":"2018-06-26T17:04:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/are-you-reactive-or-proactive-when-it-comes-to-it-security\/"},"wordCount":558,"commentCount":0,"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/are-you-reactive-or-proactive-when-it-comes-to-it-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","articleSection":["Tech Tips from the President"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stratospherenetworks.com\/blog\/are-you-reactive-or-proactive-when-it-comes-to-it-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stratospherenetworks.com\/blog\/are-you-reactive-or-proactive-when-it-comes-to-it-security\/","url":"https:\/\/www.stratospherenetworks.com\/blog\/are-you-reactive-or-proactive-when-it-comes-to-it-security\/","name":"Are You Reactive or Proactive When it Comes to IT Security?","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/are-you-reactive-or-proactive-when-it-comes-to-it-security\/#primaryimage"},"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/are-you-reactive-or-proactive-when-it-comes-to-it-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","datePublished":"2016-05-19T15:59:40+00:00","dateModified":"2018-06-26T17:04:15+00:00","author":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c"},"description":"With the rise of smarter cyber criminals and rapidly evolving threats, using a proactive approach to IT security is more important than ever.\u00a0","breadcrumb":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/are-you-reactive-or-proactive-when-it-comes-to-it-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stratospherenetworks.com\/blog\/are-you-reactive-or-proactive-when-it-comes-to-it-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/are-you-reactive-or-proactive-when-it-comes-to-it-security\/#primaryimage","url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","contentUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","width":1024,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/www.stratospherenetworks.com\/blog\/are-you-reactive-or-proactive-when-it-comes-to-it-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stratospherenetworks.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Are You Reactive or Proactive When it Comes to IT Security?"}]},{"@type":"WebSite","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website","url":"https:\/\/www.stratospherenetworks.com\/blog\/","name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","description":"The Stratosphere Networks IT Support blog offering IT Support Services information.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c","name":"dsparks","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g","caption":"dsparks"},"url":"https:\/\/www.stratospherenetworks.com\/blog\/author\/dsparks\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/1896","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=1896"}],"version-history":[{"count":2,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/1896\/revisions"}],"predecessor-version":[{"id":1899,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/1896\/revisions\/1899"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media\/3391"}],"wp:attachment":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=1896"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=1896"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=1896"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}